語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Seven deadliest wireless technologie...
~
Haines, Brad.
Seven deadliest wireless technologies attacks
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Seven deadliest wireless technologies attacks/ Brad Haines ; technical editor, Tim Kramer.
作者:
Haines, Brad.
出版者:
Burlington, MA :Syngress/Elsevier, : c2010.,
面頁冊數:
1 online resource (xvi, 122 p.) :ill. :
標題:
Wireless communication systems - Security measures. -
電子資源:
http://www.sciencedirect.com/science/book/9781597495417
ISBN:
9781597495417
Seven deadliest wireless technologies attacks
Haines, Brad.
Seven deadliest wireless technologies attacks
[electronic resource] /Brad Haines ; technical editor, Tim Kramer. - Burlington, MA :Syngress/Elsevier,c2010. - 1 online resource (xvi, 122 p.) :ill. - Syngress seven deadliest attacks series. - Syngress seven deadliest attacks series..
Includes bibliographical references and index.
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
ISBN: 9781597495417
Source: 1094073:10885961Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
563496
Wireless communication systems
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5103.2 / .H325 2010
Dewey Class. No.: 005.8
Seven deadliest wireless technologies attacks
LDR
:02760cam 2200373Ia 4500
001
691465
003
OCoLC
005
20111122091344.0
006
m d
007
cr cn|||||||||
008
120103s2010 mauab ob 001 0 eng d
019
$a
688587526
020
$a
9781597495417
020
$a
1597495417
029
1
$a
AU@
$b
000045964047
029
1
$a
NZ1
$b
13448982
035
$a
(OCoLC)613958928
$z
(OCoLC)688587526
035
$a
ocn613958928
037
$a
1094073:10885961
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
MUQ
$d
OCLCQ
$d
SFB
$d
OCLCQ
049
$a
TEFA
050
4
$a
TK5103.2
$b
.H325 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Haines, Brad.
$3
596250
245
1 0
$a
Seven deadliest wireless technologies attacks
$h
[electronic resource] /
$c
Brad Haines ; technical editor, Tim Kramer.
260
$a
Burlington, MA :
$b
Syngress/Elsevier,
$c
c2010.
300
$a
1 online resource (xvi, 122 p.) :
$b
ill.
490
1
$a
Syngress seven deadliest attacks series
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
505
0
$a
802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices.
520
$a
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
588
$a
Description based on print version record.
650
0
$a
Wireless communication systems
$x
Security measures.
$3
563496
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
6
$a
R�eseaux d'ordinateurs.
$3
655358
650
6
$a
Transmission sans fil.
$3
655523
655
4
$a
Electronic books.
$2
local
$3
554714
830
0
$a
Syngress seven deadliest attacks series.
$3
813041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597495417
938
$a
Coutts Information Services
$b
COUT
$n
14948503
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入